Skip to main content

A Ticket-Based Authentication Scheme for VANETs Preserving Privacy

  • Conference paper
  • First Online:
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10517))

Included in the following conference series:

Abstract

In Vehicular Ad hoc NETworks (VANETs), vehicles exchange safety messages in order to enhance road safety. Because of their critical role, safety messages should be authenticated before being accepted while preserving the privacy of vehicles. However, misbehaving vehicles should be traced by legal authorities and evicted from the network. In this paper, we propose a new conditional privacy-preserving authentication scheme for VANETs. The proposed scheme is based on the use of temporary tickets to maintain the privacy of vehicles. An identity-based signature technique is employed for authentication. The trusted authority can trace misbehaving vehicles, given their tickets, and RSUs handle the task of evicting them from the network. An in-depth security analysis is performed to demonstrate the efficiency of our proposal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dedicated Short Range Communications (DSRC). http://grouper.ieee.org/groups/scc32/dsrc/index.html

  2. Fan, C.I., Sun, W.Z., Huang, S.W., Juang, W.S., Huang, J.J.: Strongly privacy-preserving communication protocol for VANETs. In: 2014 Ninth Asia Joint Conference on Information Security, pp. 119–126. IEEE Press, Wuhan (2014). doi:10.1109/AsiaJCIS.2014.24

  3. Liu, Y., Wang, L., Chen, H.H.: Message authentication using proxy vehicles in vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 64(8), 3697–3710 (2015). doi:10.1109/TVT.2014.2358633

    Article  Google Scholar 

  4. Chen, J., Yuan, Q., Xue, G., Du, R.: Game-theory-based batch identification of invalid signatures in wireless mobile networks. In: 2015 IEEE Conference on Computer Communications, pp. 262–270. IEEE Press, Hong Kong (2015). doi:10.1109/INFOCOM.2015.7218390

  5. He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular Ad-hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015). doi:10.1109/TIFS.2015.2473820

    Article  Google Scholar 

  6. Mrabet, K., El Bouanani, F., Ben-Azza, H.: A secure multi-hops routing for VANETs. In: 2015 International Conference on Wireless Networks and Mobile Communications, pp. 1–5. IEEE Press, Marrakech (2015). doi:10.1109/WINCOM.2015.7381299

  7. Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016). doi:10.1109/TVT.2015.2405853

    Article  Google Scholar 

  8. Mejri, M.N., Achir, N., Hamdi, M.: A new group Diffie-Hellman key generation proposal for secure VANET communications. In: 2016 13th IEEE Annual Consumer Communications and Networking Conference, pp. 992–995. IEEE Press, Las Vegas (2016). doi:10.1109/CCNC.2016.7444925

  9. Büttner, C., Bartels, F., Huss, S.A.: Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular Ad-Hoc Networks. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 651–658. IEEE Press, Abu Dhabi (2015). doi:10.1109/WiMOB.2015.7348024

  10. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Advances in Cryptology-EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)

    Google Scholar 

  11. Yasmin, R., Ritter, E., Wang, G.: Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks. Int. J. Inf. Secur. 13(5), 453–465 (2014). doi:10.1007/s10207-013-0224-7

    Article  Google Scholar 

  12. Islam, S.K., Khan, M.K.: Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun Syst (2014). doi:10.1002/dac.2847

    Google Scholar 

  13. SHA-2. http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryma Abassi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chikhaoui, O., Chehida, A.B., Abassi, R., Fatmi, S.G.E. (2017). A Ticket-Based Authentication Scheme for VANETs Preserving Privacy. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2017. Lecture Notes in Computer Science(), vol 10517. Springer, Cham. https://doi.org/10.1007/978-3-319-67910-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67910-5_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67909-9

  • Online ISBN: 978-3-319-67910-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics